Networking Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A routing protocol's reliability and priority are rated by what measurement? a. AD b. Routing table c. Latency d. MTU

a. AD (administrative distance)

When hosting a secure email server for access from the Internet, which port should be open on the corporate firewall? 25 110 443 587

587

Which of the following defenses addresses a weakness of IPv6? DHCP snooping CoPP DAI RA guard

RA guard (router advertisement)

Which of the following applications could be used to run a website from a server? a. Hypertext Transfer Protocol b. Microsoft Exchange Server c. FileZilla d. Ngnix

d. Ngnix

Which of the following would an environmental monitoring system not track? Liquid detection User authentication Data room lights UPS voltage

User authentication

Which backup site includes a running server that does not have access to the latest backups? Warm site Cold site Hot site On site

Warm site

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use? a. ifconfig /release b. ipconfig /renew c. ipconfig /release d. ifconfig /renew

c. ipconfig /release

Your client has multiple LAN connections for his business. He wants you to install a device so that the traffic between two networks can be efficiently managed by finding the best path for traffic to get from one network to another. Which of the following will you use in this case? a. A switch b. a combo device c. An industrial grade router d. a consumer-grade router

C. industrial-grade router

Which wired WAN service offers speeds most comparable to the highest satellite Internet speeds in a similar price range? DSL Cable broadband Fiber broadband Leased fiber

Cable broadband

What protocol does ping use? HTTP ICMP DHCP FTP

ICMP (Internet Control Message Protocol)

Which security device relies on a TAP or port mirroring? NIDS HIPS FIM HIDS

NIDS (network-based intrusion detection system)

Which DNS record type is used to find an FQDN from a given IP address? A CNAME PTR MX

PTR (pointer) record

Which remote file access protocol uses port 22? FTPS TFTP FTP SFTP

SFTP

Which log type would most likely be used first to investigate the cause of high numbers of dropped packets? Traffic log System log Jitter log Audit log

Traffic log

Which part of a MAC address is unique to each manufacturer? a. The OUI b. The device identifier c. The network identifier d. The physical address

a. The OUI (Organizationally Unique Identifier)

What group must clients join to access network resources in a client-server network? a. Workgroup b. Domain c. Peer group d. RAID

b. Domain

Which encryption protocol does GRE use to increase the security of its transmissions? a. SFTP b. IPsec c. SSH d. SSL

b. IPsec

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? a. Client-server b. Star c. Hub-and-spoke d. Mesh

b. Star

Which of the following is considered a secure protocol? a. Telnet b. FTP c. SSH d. HTTP

c. SSH

What kind of device can monitor a connection at the demarc but cannot interpret data? a. Line driver b. DTE c. Smartjack d. CSU/DSU

c. Smartjack

Which of the following would be assigned an OID? An NMS server A switch's interface A web server A UDP port

A switch's interface

An ARP table maps MAC addresses to what information? IPv6 addresses Physical interfaces TCP or UDP ports IPv4 addresses

IPv4 addresses

When you set private IP address ranges for servers in your cloud, what service model are you using? IaaS SaaS DaaS PaaS

IaaS

What is the earliest transceiver type to support four channels on a single transceiver to increase throughput? QSFP SFP+ SFP QSFP+

QSFP (quad small form-factor pluggable)

Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet? a. BGP b. RIPv2 c. IP d. OSPF

a. BGP (Border Gateway Protocol)

Which function of WPA/WPA2 security ensures data cannot be read in transit? a. Encryption b. Message integrity c. Authentication d. Key distribution

a. Encryption

What is an example of an open source DBMS? a. MySQL b. Microsoft SQL Server c. TCP/IP suite d. Oracle Database

a. MySQL

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting? a. No devices b. All devices on your local network c. All devices on the Internet d. The one device that is configured with this IP address

b. All devices on your local network

You are the DNS administrator and have been tasked to identify an email server in a DNS zone file. Which of the following resource records would you apply as a DNS administrator in this case? a. AAAA record b. MX record c. PTR record d. CNAME record

b. MX record

What is the frequency range for cellular communication? a. 2.4 GHz-2.4835 GHz b. 300 GHz-300,000 GHz c. 1850 MHz-1990 MHz d. 5.1 GHz-5.8 GHz

c. 1850 MHz-1990 MHz

How many bits of a class A IP address are used for host information? a. 8 bits b. 16 bits c. 24 bits d. 32 bits

c. 24 bits

Which protocol replaced TKIP for WPA2? a. RC4 b. RADIUS c. CCMP d. WEP

c. CCMP

What is the typical maximum segment length for Ethernet networks? 10 meters 100 meters 1000 meters 10,000 meters

100 meters

Which IPv6 prefix can be routed on the Internet? 2000::/3 FE80::/10 ::1/128 FC00::/7

2000::/3

Which port should be open so you can remote into the corporate office's Linux Server from a branch office? 22 23 1433 3389

22

Which cellular generation was the first to offer speeds up to 1 Gbps? 2G 3G 4G-LTE 4G

4G

Which access control technique is responsible for detection of an intruder who succeeds in accessing a network? Authentication Accounting Geofencing Separation of duties

Accounting

Which IPsec encryption type encrypts the IP header? IKE ESP ISAKMP AH

ESP (Encapsulating Security Payload)

Which authentication protocol is optimized for wireless clients? RADIUS Active Directory TACACS+ Kerberos

RADIUS (Remote Authentication Dial-In User Service)

Which routing protocol is limited to 15 hops? EIGRP OSPF BGP RIPv2

RIPv2 (Routing Information Protocol, version 2)

Which STP bridge serves as the basis for all path calculations? Designated bridge Header bridge Spanning bridge Root bridge

Root bridge

Where is a router's hostname stored when you first change the name? Routing table Startup-config file Whitelist Running-config file

Running-config file

Which device will let you determine all frequencies within a scanned range that are present in a specific environment, not just Wi-Fi? Wi-Fi analyzer Captive portal Wireless LAN controller Spectrum analyzer

Spectrum analyzer

What is the formula for determining the number of possible hosts on a network? a. 2h - 2 = Z b. 2h = Z c. 2n - 2 = Y d. 2n = Y

a. 2h - 2 = Z

You have been contracted to install a wireless network connection at Vice City Public School. The school management has requested you to install the latest available Wi-Fi technology for the students. Which of the following frequencies will you use to establish the connection in this scenario? a. 5.1 GHz-5.8 GHz b. 2.446 GHz-2.454 GHz c. 1850 MHz-1990 MHz d. 300 GHz-300,000 GHz

a. 5.1 GHz-5.8 GHz

Which IEEE standard determines how VLANs work on a network? a. 802.1Q b. 802.11 c. 802.3af d. 802.1X

a. 802.1Q

You are a network manager who wants to distribute sensitive privileges and responsibilities to different persons so that no single person can singlehandedly compromise the security of data and resources. Which authorization method will you apply in this scenario? a. SoD b. DAC c. MAC d. RBAC

a. SoD (separation of duties)

You are working as a network engineer for Maywire Cables. The network administrator informs you to install a firewall that will manage each packet as a fresh connection irrespective of any connections that might be active at that moment. Which of the following will you choose? a. Stateless firewall b. Stateful firewall c. Packet-filtering firewall d. Host-based firewall

a. Stateless firewall

hich of the following is a form of authentication in which a client signs on one time to access multiple systems or resources? a. TGS b. KDC c. SSO d. AS

a. TGS

In the formula 2h - 2 = Z, what does h represent? a. h equals the number of bits remaining in the host portion. b. h equals the number of subnets that result. c. h equals the number of bits that must be switched from the host address to the network ID. d. h equals the number of hosts available in each subnet.

a. h equals the number of bits remaining in the host portion.

Which of the following is part of a network's physical topology? a. A network server's operating system b. A printer plugged into a nearby desktop computer c. Password for the wireless network d. File permission settings on a desktop computer

b. A printer plugged into a nearby desktop computer

Which of the following will act as the point where the WAN ends and the LAN begins? a. Work area b. Demarc c. MDF d. Data room

b. Demarc

Which one of the following wireless transmission types requires a clear LOS to function? a. Bluetooth b. IR c. Wi-Fi d. NFC

b. IR

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records? a. ping b. dig c. ipconfig d. ip

b. dig

In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system? a. On-path attack b. Deauth attack c. Back doors d. DNS poisoning

c. Back doors

In order to ensure better security measures for the computers used in your organization, you, as a network administrator, have decided to configure the software to remove corporate data from all devices while leaving personal data untouched. Which of the following software will you use in this scenario? a. LastPass b. Wireshark c. Meraki Systems Manager d. CEED

c. Meraki Systems Manager

Which cloud characteristic allows resources to be changed quickly and dynamically, even automatically in response to changing demands? a. Broad network access b. Measured service c. Rapid elasticity d. Resource pooling

c. Rapid elasticity

Which of the following is a battery-operated power source directly attached to one or more devices and to a power supply, such as a wall outlet, that provides a backup power source in the event of a power outage? a. PDU b. Surge protector c. UPS d. Generator

c. UPS

Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network? a. War driving b. WPA attack c. WPS attack d. War chalking

c. WPS attack (Wi-Fi Protected Setup)

Which of the following is used to validate a client initially? a. TGS b. KDC c. SSO d. AS

d. AS (autonomous system)

What specifications define the standards for cable broadband? a. FTTC b. PSTN c. HFC d. DOCSIS

d. DOCSIS

Which type of DoS attack orchestrates an attack bounced off uninfected computers? a. FTP bounce b. Ransomware c. PDoS attack d. DRDoS attack

d. DRDoS attack

Which of the following transmissions allows a signal to travel in both directions simultaneously? a. Simplex b. Half-duplex c. Multiplexing d. Full-duplex

d. Full-duplex

Which of the following is an advantage of P2P file sharing? a. Scalable b. Centrally controlled c. Secure d. Inexpensive

d. Inexpensive

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? a. Symmetric b. Availability c. Confidentiality d. Integrity

d. Integrity

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols? a. Layer 2 b. Layer 5 c. Layer 4 d. Layer 3

d. Layer 3

In which of the following cloud models is service provided over public transmission lines? a. Community cloud b. Private cloud c. Hybrid cloud d. Public cloud

d. Public cloud

Which of the following protocols keeps all potential paths active while managing the flow of data across the paths to prevent loops? a. RSTP b. CARP c. TRILL d. SPB

d. SPB

What kind of route is created when a network administrator configures a router to use a specific path between nodes? a. Trace route b. Default route c. Dynamic route d. Static route

d. Static route

Which port mode on a switch enables that port to manage traffic for multiple VLANs? a. Private b. Access c. Community d. Trunk

d. Trunk

Which of the following commands is used to pair the class map to the policy map in CoPP (control plane policing)? a. ip dhcp snooping b. raguard c. access-list d. class

d. class

You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this? a. ping b. nmap c. netstat d. tcpdump

d. tcpdump

Which of the following KPIs (key performance indicators) refers to the actual throughput used as a percentage of available bandwidth? a. Utilization b. Error rate c. Jitter d. Packet drops

a. Utilization

Which of the following wireless technologies does not use the 2.4 GHz band? a. Z-Wave b. ZigBee c. Wi-Fi d. Bluetooth

a. Z-Wave

You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply. a. Zenmap b. Command Prompt c. PowerShell d. Microsoft Edge

a. Zenmap b. Command Prompt c. PowerShell

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? a. DiffServ b. Checksum c. Acknowledgment number d. Source port

b. Checksum

What type of attack relies on spoofing? a. Friendly DoS attack b. Deauth attack c. Pen testing d. Tailgating

b. Deauth attack

What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network? a. Root server b. Default gateway c. DNS server d. DHCP server

b. Default gateway

What do well-chosen subnets accomplish? a. Problems affect the entire network, making them more difficult to pin down. b. Network documentation is easier to manage. c. IP address spaces overlap for easier management. d. Routing efficiency is decreased by ensuring IP address spaces are not mathematically related.

b. Network documentation is easier to manage.

You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation? a. Port 20 b. Port 22 c. Port 69 d. Port 989

c. Port 69

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address? a. netstat -n b. tracert 192.168.1.56 c. arp -a d. telnet 192.168.1.56

c. arp -a

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? a. Layer 4 b. Layer 3 c. Layer 2 d. Layer 1

b. Layer 3

The Jaypeg Group of Institutions has come up with a new department for sociology. It has hired you to complete the network setup for this department. On inspection, you get to know that you just need to extend the connection provided by an existing ISP. Where will you, as a network engineer, extend the connection to in such a case? a. Data room b. MDF c. Work area d. IDF

d. IDF (intermediate distribution frame)

Which of the following monitors traffic at a specific interface between a server or client and the network? a. Network monitor b. Reporting c. Port mirroring d. Protocol analyzer

d. Protocol analyzer

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet? a. VoIP phone b. Legacy PBX c. Voice gateway d. Dedicated telephone switch

c. Voice gateway

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11g b. 802.11ac c. 802.11b d. 802.11ax

d. 802.11ax

When a router can't determine a path to a message's destination, where does it send the message? a. Gateway of last resort b. Administrative distance c. Default gateway d. Routing table

a. Gateway of last resort

Which cloud service model gives software developers access to multiple platforms for testing code? a. SaaS b. PaaS c. XaaS d. IaaS

b. PaaS

Which flow control method resends a lost frame along with all frames sent with it? Selective repeat sliding window Stop-and-wait Go-back-n sliding window Backpressure

Go-back-n sliding window

Which protocol balances traffic across multiple links? CARP LACP VIP VRRP

LACP (Link Aggregation Control Protocol)

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? a. Evil twin b. Captive portal c. Guest network d. Brute force attack

a. Evil twin

Which fiber connector contains two strands of fiber in each ferrule? a. MT-RJ b. SC c. LC d. ST

a. MT-RJ

Which type of DNS record identifies an email server? a. MX record b. AAAA record c. CNAME record d. PTR record

a. MX record

Which OSI layer is responsible for directing data from one LAN to another? a. Network layer b. Physical layer c. Transport layer d. Data link layer

a. Network layer

What is one advantage offered by VDI over RDS and VNC? a. Offers access to multiple OSs in VMs b. Supports remote access to mobile devices c. Provides open source flexibility d. Allows multiple users to sign in at once

a. Offers access to multiple OSs in VMs

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use? a. Peer-to-peer b. Hybrid c. Ring d. Hub-and-spoke

a. Peer-to-peer

Which kind of multiplexing assigns slots to nodes according to priority and need? a. STDM (statistical time division multiplexing) b. TDM (time division multiplexing) c. WDM (wavelength division multiplexing) d. CWDM (coarse wavelength division multiplexing)

a. STDM (statistical time division multiplexing)

Which protocol's header would a layer 4 device read and process? a. TCP b. HTTP c. ARP d. IP

a. TCP

What method does a GSM network use to separate data on a channel? a. TDMA b. TDM c. CDMA d. SIM

a. TDMA (time division multiple access)

Frank has been appointed as a network engineer with an Internet service provider firm. His first assignment as an engineer is to set up a 1000BASE-T standard Fast Ethernet for Horizon Corporates. While doing so, the ISP has specifically requested him to concentrate on installing the necessary twisted-cable pairs as all the other specified standards will be looked after by the other members of the team, which has been allocated for this project. Analyze which of the following pairs of twisted cables Frank should use in this scenario. a. Use a Category 5e cable for this scenario b. Use a Category 5 cable for this scenario c. Use a Category 7 cable for this scenario d. Use a Category 6 cable for this scenario

a. Use a Category 5e cable for this scenario

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer? a. 22 b. 23 c. 80 d. 443

b. 23

Which formulas can be used to calculate the magic number? Choose two. a. 2h - 2 b. 256 - the interesting octet c. 2h d. 2n

b. 256 - the interesting octet c. 2h

The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario. a. 802.11b b. 802.11g c. 802.11n d. 802.11a

b. 802.11g

Tyler has plans of setting up a cellular network distribution plant for which he has contacted you to act as a service manager. Your first job as a service manager is to document the necessary frequency range under which this 800 band will be operational. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection? a. 2.4 GHz-2.4835 GHz b. 824 MHz-896 MHz c. 5.1 GHz-5.8 GHz d. 1850 MHz-1990 MHz

b. 824 MHz-896 MHz

Which Carrier Sense technology is used on wireless networks to reduce collisions? a. EAPoL b. CSMA/CA c. CSMA/CD d. SSID

b. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters? a. Cat 7 b. Cat 6a c. Cat 5e d. Cat 6

b. Cat 6a

Jeff Green has been hired as a systems analyst by an online retail company. The company is expecting a huge network traffic triggered by the Christmas sale, which will begin from the midnight of December 23. There is an urgent need to adopt a congestion control technique, and it is Jeff's responsibility to ensure that he selects an appropriate open-loop congestion control technique to prevent this congestion before it occurs. Which of the following techniques should Jeff ideally choose to ensure that important traffic can survive the congestion while less sensitive frames are discarded? a. Window policy b. Discarding policy c. Admission policy d. Acknowledgment policy

b. Discarding policy

When shopping for a new router, what does the MTBF tell you? a. How long until that device fails b. How long devices like this one will last on average until the next failure c. How long it will usually take to repair that device d. How much it will cost to repair that device

b. How long devices like this one will last on average until the next failure

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? a. Terminal emulation b. Hypervisor c. NFV (Network Functions Virtualization) d. SDN (software-defined networking)

b. Hypervisor

What is the first step of inventory management? a. Interview users. b. List all components on the network. c. Identify network requirements. d. List an administrative account's username and password for each device on a network.

b. List all components on the network.

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? a. MDM b. NDA c. AUP d. BYOD

b. NDA

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use? a. Backbone cable b. Patch cable c. Plenum-rated cable d. Fiber-optic cable

b. Patch cable

Which DNS server offers the most current resolution to a DNS query? a. Root DNS server b. Primary DNS server c. Caching DNS server d. TLD DNS server

b. Primary DNS server

Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel. a. Use the IKE to establish security parameters b. Renegotiate and reestablish the connection before the current session gets timed out c. Use ISAKMP for managing keys d. Use IPsec initiation for completion

b. Renegotiate and reestablish the connection before the current session gets timed out

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign? a. SMTP b. SQL c. FTP d. TLS

b. SQL

Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda. a. Set the PSH to 1 byte in the flag segment of the TCP segment b. Set the SYN to 1 byte in the flag segment of the TCP segment c. Set the RST to 1 byte in the flag segment of the TCP segment d. Set the FIN to 1 byte in the flag segment of the TCP segment

b. Set the SYN to 1 byte in the flag segment of the TCP segment

You have been called to troubleshoot a problem, and you have successfully managed to establish a theory of probable cause. You have managed to reach this layer after considering multiple approaches through the OSI model. Which recommended step should you perform next if you follow the OSI model of troubleshooting? a. Implement the solution or escalate the problem. b. Test your theory to determine the cause. c. Establish a plan for resolving the problem. d. Document findings, actions, and outcomes.

b. Test your theory to determine the cause.

Which hexadecimal block in an IPv6 address is used for the Subnet ID? a. The third one b. The fourth one c. The first one d. The eighth one

b. The fourth one

Which of the following terms refer to the number of data bits (0s and 1s) that are actually received across a connection each second? a. Frequency b. Throughput c. Attenuation d. Bandwidth

b. Throughput

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair? a. Tone generator b. Tone locator c. TDR d. Toner

b. Tone locator

Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation? a. Telnet b. VNC c. RDP d. SSH

b. VNC (Virtual Network Computing)

Which of the following backups is managed by third-party vendors? a. Full backup b. Differential backup c. Cloud backup d. Incremental backup

c. Cloud backup

Which assignment technique requires a RADIUS server? a. Dynamic IP address assignment b. Static IP address assignment c. Dynamic VLAN assignment d. Static VLAN assignment

c. Dynamic VLAN assignment

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them? a. Work area b. CEO's office c. EF d. IDF

c. EF (entrance facility)

When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself? a. ::1/128 b. FF00::/8 c. FE80::/64 d. 2000::/3

c. FE80::/64

In the event of a fire, the most appropriate failure policy is a _______ policy. a. Fail-close b. Shutdown c. Fail-open d. Power-off

c. Fail-open

Which two protocols manage neighbor discovery processes on IPv4 networks? a. TCP and UDP b. NDP and Ethernet c. ICMP and ARP d. IPv4 and IPv6

c. ICMP and ARP (Internet Control Message Protocol) (Address Resolution Protocol)

Which of these cellular technologies offers the fastest speeds? a. 4G-LTE b. GSM c. LTE-A d. CDMA

c. LTE-A

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? a. Switch b. Firewall c. Load balancer d. Router

c. Load balancer

What information does the switchport port-security command use to restrict access to a switch's interface? a. Port number b. Broadcast address c. MAC address d. IP address

c. MAC address

With which network connection type does the VM obtain IP addressing information from its host? a. Managed mode b. Bridged mode c. NAT mode d. Isolation mode

c. NAT mode

Which of the following is an application layer protocol? a. Apache b. IP c. RDP d. TCP

c. RDP

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? a. Channel b. Band c. RSSI d. EIRP

c. RSSI (received signal strength indicator)

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two. a. Vulnerability assessment b. Security audit c. Red team-blue team exercise d. Pen testing

c. Red team-blue team exercise d. Pen testing

RCB Logistics wants to upgrade the cabling of its network as it was still running on older fiber networks. It has outsourced the cabling project to Bear & Co. that appointed Watson as a network engineer. On inspection, it gets to know that the older fiber networks were connected using an ST connector. Watson decides that he will replace the SMF cables with MMF cables in order for the signaling to be in full-duplex mode. Analyze which of the following connectors would be most ideal in this situation for Watson to replace the cables. a. Replace the cables using a 1.25 mm ferrule LC b. Replace the cables using a 2.25 mm ferrule ST c. Replace the cables using an MT-RJ connector d. Replace the cables using a 2.25 mm ferrule SC

c. Replace the cables using an MT-RJ connector

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? a. War driving b. Hidden node c. Rogue AP d. Evil twin

c. Rogue AP

Which of the following occurs when there is fluctuation in voltage levels caused by other devices on the network or EMI? a. Blackout b. Brownout c. Surge d. Noise

c. Surge

Which of the following is not a good reason to segment a network? a. To narrow down the location of problems on a network b. To limit access to broadcast domains c. To increase the number of networking devices on a network d. To reduce the demand on bandwidth

c. To increase the number of networking devices on a network

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin? a. Brown b. White/orange c. White/green d. Blue

c. White/green

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet? a. 9 bits b. 10 bits c. 0 bits d. 8 bits

d. 8 bits

Kevin Mills is a network technician who has been hired by Globcom Telecommunications to fix an error related to emails and messages. The error primarily did not allow the messages sent out by the HR department to arrive intact at the receiving applications on the employees' workstations. Kevin plans to follow the OSI model for troubleshooting. Analyze the statements and suggest which layer of the OSI model Kevin should inspect to understand and resolve the issue. a. The transport layer might be able to solve the issue related to the email. b. The network layer is responsible for moving messages. c. One should check the physical layer in the OSI model. d. One should troubleshoot the issue using the session layer.

d. One should troubleshoot the issue using the session layer.

Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management? a. Room Alert Monitor by AVTECH b. Spiceworks c. Wireshark d. PRTG dashboard by Paessler

d. PRTG dashboard by Paessler

You are hired as a network administrator to monitor the organization's network status on an ongoing basis to make changes to meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that there is a lot of delay in network communications because some of the devices used in the network are resending transmissions. Which of the following KPIs will help you in getting a better understanding of the situation? a. Utilization b. Error rate c. Jitter d. Packet drops

d. Packet drops

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities? a. Data breach b. Security audit c. Exploit d. Posture assessment

d. Posture assessment

Which of the following protocols is used for encrypted control of remote Windows computers? a. ICMP b. NTP c. Syslog d. RDP

d. RDP

Which type of switch connects all devices in a rack to the rest of the network? a. EoR switch b. Spine switch c. Core switch d. ToR switch

d. ToR switch

Which SAN connection technology can run over ordinary Ethernet NICs without any special equipment needed? FC iSCSI SATA IB

iSCSI

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack? a. RG-6 coaxial cable b. Cat 5e twisted-pair cable c. Cat 6 twisted-pair cable d. Passive twinaxial cable

d. Passive twinaxial cable

Which DNS record type is listed first in a zone file? A AAAA CNAME SOA

SOA (start of authority) record

Which bandwidth management technique limits traffic specifically between a single sender and a single receiver? Congestion control Traffic shaping Quality of Service Flow control

Flow control

Which virtual network connection type assigns a VM its IP address from the physical network? NAT Bridged Private Host-only

Bridged

An attacker guesses an executive's password ("M@nd@lori@n") to a sensitive database after chatting for a while at a club. What kind of password attack did the hacker use? Dictionary attack Brute-force attack Zero-day attack Rainbow table attack

Brute-force attack

Which tool could you use to test a twisted-pair cable's pinout? OTDR Toner probe OPM Continuity tester

Continuity tester

Which type of identifier allows wireless clients to roam freely from AP to AP? BSSID IP address ESSID Transmitter address

ESSID (extended service set identifier)

Which type of switch is best used for connections to web servers? Edge switch Core switch Spine switch Aggregation switch

Edge switch

Which of the following improves overall network performance? Jitter Multiplexing Attenuation Latency

Multiplexing

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario? a. GRE b. OpenVPN c. L2TP d. IKEv2

a. GRE (Generic Routing Encapsulation)

Hypervile Solutions has hired Joseph to establish a multimedia session so that it can preview its products to a list of potential clients. Joseph has to ensure that the session is properly encrypted so that there is no loss or theft of data as it will be a closed meeting. Analyze which of the following ports should be opened in this case. a. Port 5061 b. Port 3306 c. Port 3389 d. Port 1433

a. Port 5061

You are the network administrator of Virve Mobile Services. You as a network administrator must create user groups associated with the roles of a user as specified to you by the user's supervisor and assign privileges and permissions to each user group. Each user is assigned to a user group that matches a requirement for their job. Which of the following will you use in this scenario? a. RBAC b. DAC c. SIEM d. SoD

a. RBAC (role-based access control)

Which type of crosstalk occurs between wire pairs near the source of a signal? a. Alien crosstalk b. NEXT c. Jitter d. FECT

b. NEXT

Which of the following manages a refrigeration system or a gas pipeline? a. Native VLAN b. Trunking c. ICS d. Router-on-a-stick

c. ICS

As a network engineer, you have installed a wireless connection in a newly constructed office floor for Black & White Communications. The CEO's office files a complaint about slow data transmission with the IT department. The IT department gets in touch with you to fix this error. On inspection, you realize that the problem is primarily because of large obstacles like walls and ceilings because of which the wave bounces back to its source. What of the following phenomena will you state as a cause of this error while reporting to the IT department? a. Refraction b. Attenuation c. Reflection d. Interference

c. Reflection

Which of the following are also known as content switches or application switches? a. EoR switches b. ToR switches c. Layer 3 switches d. Layer 4 switches

d. Layer 4 switches

Which firewall type can protect a home network from adult content not suitable for the family's children? Packet-filtering firewall Host-based firewall Stateless firewall Application layer firewall

Application layer firewall

The following ports were listed as open during a recent port scan. Which one is no longer used except by legacy software and should be closed? 22 53 139 443

139

What numbering system do humans use to write MAC addresses? Decimal Binary Base-2 Hexadecimal

Hexadecimal


संबंधित स्टडी सेट्स

Social Psych Chapter 7: Attitudes

View Set

Unit 5 IDs: The Civil War and Reconstruction

View Set

Final Exam Quizlet for Computer Science 1

View Set

Quiz 2 Unit 8 Review: Selecting Stocks

View Set

Supply Chain Management - Chapter 9 Logistics: Warehousing, Transportation, and Reverse Logistics

View Set

APUSH: Chapter 18 Connect Review

View Set